01-08-2012
If I am not wrong, VPN requires the following criteria
1.Cert keys on your PC
2.Cert keys on your authenticating server.
VPN allows users to connect to private n/w from almost any location.So dynamic Ip should not create a problem.
Something needs to be changed under your scenario as only IT has permissions to make changes in the firewall.
Byee
10 More Discussions You Might Find Interesting
1. Solaris
I am currently setting up rdiff-backup to use ssh to connect and remotely backup and retrieve data. I am doing so by creating rsa keys for each server and copying the relevant key to the /.ssh folder on the relevant server.
All seems to work well when severs running solaris 8 with ssh 3.6.1 are... (6 Replies)
Discussion started by: falklandtim
6 Replies
2. UNIX for Advanced & Expert Users
Hi
Can someone giv me some knowledge on accesing windows from unix and executing DOS scripts using SSH
I would like to know how to go abt it...am new to it.
Thanks in advance (1 Reply)
Discussion started by: lakshmis10
1 Replies
3. Shell Programming and Scripting
Hi All,
I've a log file call netbackup.log in all the 5 servers in location usr/netbackup.log. I dont want to login in each server and check the log file. So i wanted to have a script written to have the log information at one place.
I want to have the last 2 lines from the file... (2 Replies)
Discussion started by: suri.tyson
2 Replies
4. Shell Programming and Scripting
Hi All,
Here i am having a problem in my script....:)
i have one script which will connect from my linux box to antoher linux box..
let say...currently i am in 55.23.621.123
and i want to connect to another box which is 55.23.621.118
as we know we can connect using ssh... (2 Replies)
Discussion started by: Shahul
2 Replies
5. Shell Programming and Scripting
Hi all,
I have a script written successfully and tuned by our members, now I am trying to execute this script from a taxi server.
My aim is I want to connect to four servers via ssh where I want to ran a script or run some commands and write the output to a file in the Taxi server.
I... (12 Replies)
Discussion started by: senthilkumar_ak
12 Replies
6. Linux
Well im on Fedora, and theres no sub section for Fedora so yea
Well how do you connect to an SSH, while on a windows terminal?
And also to transfer a file from my desktop to a server?
how is this done
scp command is not working for me (3 Replies)
Discussion started by: gangsta
3 Replies
7. UNIX for Dummies Questions & Answers
Hi,
sorry if this is the wrong forum for this question but I couldnt spot another obvious forum for it.
I have a windows shortcut which opens up a saved session in putty. From this session I then ssh to another remote server. I was wondering is there a way that I can either edit my shortcut... (2 Replies)
Discussion started by: newb1000
2 Replies
8. Programming
Hi I have been trying to connect a remote linux server in a java program through ssh. Can anyone tell me the proper library to include?
Thanks
Ananth (0 Replies)
Discussion started by: Ananthdoss
0 Replies
9. UNIX for Advanced & Expert Users
We have 2 different servers say A and B and I want to check the log file of 2 servers simultaneously.
If I am logged into server A how can I connect to server B.
I have used ssh username@B.But it is asking password. How can I give the password on ssh.
Or is there any other utility for... (2 Replies)
Discussion started by: jim john
2 Replies
10. Red Hat
i have been learning linux from some time for linux plus exam and learned SSH protocol and have practised to connect to remote computer within Lan network and able to sucesssfully connect it .
using
ssh username@hostname
But i wish to ask how do i use same ssh protocol to connect to other ... (6 Replies)
Discussion started by: lobsang
6 Replies
LEARN ABOUT CENTOS
strongimcv_pki
PKI(1) strongSwan PKI(1)
NAME
pki - Simple public key infrastructure (PKI) management tool
SYNOPSIS
pki command [option ...]
pki -h | --help
DESCRIPTION
pki is a suite of commands that allow you to manage a simple public key infrastructure (PKI).
Generate RSA and ECDSA key pairs, create PKCS#10 certificate requests containing subjectAltNames, create X.509 self-signed end-entity and
root CA certificates, issue end-entity and intermediate CA certificates signed by the private key of a CA and containing subjectAltNames,
CRL distribution points and URIs of OCSP servers. You can also extract raw public keys from private keys, certificate requests and certifi-
cates and compute two kinds of SHA-1-based key IDs.
COMMANDS
-h, --help
Prints usage information and a short summary of the available commands.
-g, --gen
Generate a new private key.
-s, --self
Create a self-signed certificate.
-i, --issue
Issue a certificate using a CA certificate and key.
-c, --signcrl
Issue a CRL using a CA certificate and key.
-r, --req
Create a PKCS#10 certificate request.
-7, --pkcs7
Provides PKCS#7 wrap/unwrap functions.
-k, --keyid
Calculate key identifiers of a key or certificate.
-a, --print
Print a credential (key, certificate etc.) in human readable form.
-p, --pub
Extract a public key from a private key or certificate.
-v, --verify
Verify a certificate using a CA certificate.
EXAMPLES
Generating a CA Certificate
The first step is to generate a private key using the --gen command. By default this generates a 2048-bit RSA key.
pki --gen > ca_key.der
This key is used to create the self-signed CA certificate, using the --self command. The distinguished name should be adjusted to your
needs.
pki --self --ca --in ca_key.der
--dn "C=CH, O=strongSwan, CN=strongSwan CA" > ca_cert.der
Generating End-Entity Certificates
With the root CA certificate and key at hand end-entity certificates for clients and servers can be issued. Similarly intermediate CA cer-
tificates can be issued, which in turn can issue other certificates. To generate a certificate for a server, we start by generating a pri-
vate key.
pki --gen > server_key.der
The public key will be included in the certificate so lets extract that from the private key.
pki --pub --in server_key.der > server_pub.der
The following command will use the CA certificate and private key to issue the certificate for this server. Adjust the distinguished name,
subjectAltName(s) and flags as needed (check pki --issue(8) for more options).
pki --issue --in server_pub.der --cacert ca_cert.der
--cakey ca_key.der --dn "C=CH, O=strongSwan, CN=VPN Server"
--san vpn.strongswan.org --flag serverAuth > server_cert.der
Instead of storing the public key in a separate file, the output of --pub may also be piped directly into the above command.
Generating Certificate Revocation Lists (CRL)
If end-entity certificates have to be revoked, CRLs may be generated using the --signcrl command.
pki --signcrl --cacert ca_cert.der --cakey ca_key.der
--reason superseded --cert server_cert.der > crl.der
The certificate given with --cacert must be either a CA certificate or a certificate with the crlSign extended key usage (--flag crlSign).
URIs to CRLs may be included in issued certificates with the --crl option.
SEE ALSO
pki --gen(1), pki --self(1), pki --issue(1), pki --signcrl(1), pki --req(1), pki --pkcs7(1), pki --keyid(1), pki --print(1), pki --pub(1),
pki --verify(1)
5.1.1 2013-07-31 PKI(1)